The Year of Computing (more) Dangerously

Washington Post has a good article about computer security trends for 2006. I’m not going to link to the Washington Post though. I want you to read the version with the Bruce Sterling commentary….

The result is that even if law enforcement or security experts manage to take down the infected PC responsible for relaying traffic to one of the scam sites, the effect of that takedown is only temporary, as the attackers can simply substitute another computer they have gained control over. Such scams make it far more difficult for security experts to find the true location of phishing servers. (((I was actually sitting in an audience when Donn Parker predicted that things like this would be possible someday. I was so impressed that I put it in the last chapter of my book HACKER CRACKDOWN. There’s a whole list of the guy’s dark imaginings in there. They all came true and then some.))) Link—>